نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2008
Italo Dacosta Neel Mehta Evan Metrock Jonathon T. Giffin

IP phones are an essential component of any VoIP infrastructure. The hardware constraints and newness of these devices, as compared to mature desktop or server systems, lead to software development focused primarily on features and functionality rather than security and dependability. While several automated tools exist to test the security of IP phones, these tools have limitations and can not...

Journal: :Wireless Communications and Mobile Computing 2007
Paris Kitsos Nicolas Sklavos Odysseas G. Koufopavlou

Universal mobile telecommunication system (UMTS) has specified security mechanisms with extra features compared to the security mechanisms of previous mobile communication systems (GSM, DECT). A hardware implementation of the UMTS security mechanism is presented in this paper. The proposed VLSI system supports the Authentication and Key Agreement procedure (AKA), the data confidentiality proced...

Journal: :IEEE Transactions on Very Large Scale Integration Systems 2022

Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC) chips in a practical utilization environment. This article provides overviews of physical attacks cryptographic circuits, associated vulnerabilities an IC chip, and protection schemes the vertical unification systems, packaging technologies. The design principles on-chip monitoring circuits to sense attack...

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

2005
Gwenaël J. Doërr Jean-Luc Dugelay

Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However, fifteen years after its infancy, it is still viewed as a young technology and digital watermarking is far from being introduced in Digital Right Management (DRM) frameworks. A possible explanation is that the research community has so far mainly focused on the robustness of...

2018
Haitao Xu Fengyuan Xu Bo Chen

Internet Protocol (IP) cameras have become virtually omnipresent for organizations, businesses, and personal users across the world, for the purposes of providing physical security, increasing safety, and preventing crime. However, recent studies suggest that IP cameras contain less than ideal security and could be easily exploited by miscreants to infringe user privacy and cause even bigger th...

2014
Neha Khatri Satwinder Singh

Neha Khatri Department of Computer Science, CBS Group of Institutions, Jhajjar Delhi-NCR(Haryana), India Dr. Satwinder Singh Department of Computer Science Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, India ______________________________________________________________________________________ Abstract: Data security has consistently been a major issue in information te...

2017
Johannes Obermaier Stefan Tatschner

Almost every microcontroller with integrated flash features firmware readout protection. This is a form of content protection which aims at securing intellectual property (IP) as well as cryptographic keys and algorithms from an adversary. One series of microcontrollers are the STM32 which have recently gained popularity and thus are increasingly under attack. However, no practical experience a...

2014
Yunchuan Sun Junsheng Zhang Yongping Xiong Guangyu Zhu

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been invest...

Journal: :JCP 2013
Yun Niu Liji Wu Xiangmin Zhang

The IP security protocol (IPSec) is an important and widely used security protocol in the IP layer. But the implementation of the IPSec is a computing intensive work which greatly limits the performance of the high speed network. In this paper, a high performance IPSec accelerator used in a 10Gbps in-line network security processor (NSP) is presented. The design integrates the protocol processi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید